This project contains files for cyber security
☆36Dec 17, 2018Updated 7 years ago
Alternatives and similar repositories for ml_cyber_security_usecases
Users that are interested in ml_cyber_security_usecases are comparing it to the libraries listed below
Sorting:
- ☆16Jan 5, 2017Updated 9 years ago
- InSpec profile to validate the secure configuration of Red Hat Enterprise Linux 7, against DISA's Red Hat Enterprise Linux 7 Security Tec…☆15Dec 15, 2025Updated 2 months ago
- ☆15Mar 13, 2021Updated 4 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Jan 29, 2021Updated 5 years ago
- Awesome list for asm2vec☆17Feb 1, 2021Updated 5 years ago
- Experimental ONLY: This consolidated data of scenario-2 of the US-CERT dataset for insider threats to be used with TF 2.0 and Keras☆20Apr 28, 2022Updated 3 years ago
- An Interpretable Self-Attention Network with block-attention and attention-attribution.☆12Sep 22, 2023Updated 2 years ago
- My graduation project☆11Feb 16, 2022Updated 4 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆221Apr 25, 2024Updated last year
- https://www.cdxy.me/?p=806☆32May 20, 2019Updated 6 years ago
- Online Comment Toxicity Analysis using averaging the Classifiers and used both char level as well as word level n-grams.☆10Mar 31, 2018Updated 7 years ago
- Code used in Tiukhova et al. (2022). Influencer Detection with Dynamic Graph Neural Networks. TGL@Neurips 2022.☆11Feb 9, 2023Updated 3 years ago
- Wideband spectrum sensing dataset☆10Jun 11, 2022Updated 3 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Netcap Tensorflow Deep Neural Network☆15Apr 26, 2020Updated 5 years ago
- An open source tool chain to simulate cyber attacks in the power system☆12May 4, 2017Updated 8 years ago
- An IdaPython tool for getting syscall's ID and function name from ntdll.dll, user32.dll, and so on.☆13Oct 2, 2016Updated 9 years ago
- A small database to test different machine learning tasks. It contains simple shapes of different colors.☆11Sep 18, 2022Updated 3 years ago
- Free and Open Platform for AI-assisted Computing☆10May 19, 2019Updated 6 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Generate fake data for any purpose☆10Dec 21, 2020Updated 5 years ago
- A skid ripped source of the Dream qBot Botnet developed By Komodo. Leaked By Tiger. Enjoy, it comes with instructions!☆12Oct 5, 2020Updated 5 years ago
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Mar 29, 2021Updated 4 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Chitrarth: Bridging Vision and Language for a Billion People☆13Feb 12, 2025Updated last year
- 易观性别年龄预测算法大赛--第8名解决方案☆11Oct 19, 2018Updated 7 years ago
- Matlab code of the proposed hybrid DGA method for power transformer fault diagnosis.☆11Apr 9, 2023Updated 2 years ago
- 为bpa使用者提供基于Python的自动化操作☆11Jun 24, 2024Updated last year
- Our repo for the PhysioNet Computing in Cardiology Challenge 2018☆14Jul 3, 2020Updated 5 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- 甲方企业安全建设开源之路☆10Oct 11, 2018Updated 7 years ago
- Helpers for getting CHN up and running through the Quickstart guide☆12Mar 2, 2021Updated 5 years ago
- TriFlow: Triaging Android Applications using Speculative Information Flows☆13Dec 26, 2022Updated 3 years ago
- ☆12Aug 12, 2024Updated last year
- strongDM SDK for the Python programming language.☆16Updated this week
- Shell escape a string to safely use it as a token in a shell command (backport of Python shlex.quote)☆16Apr 29, 2021Updated 4 years ago
- ☆19Updated this week
- Query.AI plugin for Kibana☆13Nov 10, 2019Updated 6 years ago
- An archive of BASHLITE source code☆12Oct 29, 2016Updated 9 years ago